Skip to main content
GET
/
audit_log_entries
/
{id}
Get a single audit log entry by ID
curl --request GET \
  --url https://api.arcuserp.com/v1/audit_log_entries/{id} \
  --header 'Authorization: Bearer <token>'
{
  "id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
  "object": "audit_log_entry",
  "entity_id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
  "actor": {
    "type": "user",
    "id": "<string>",
    "label": "<string>",
    "name": "<string>",
    "email": "<string>",
    "on_behalf_of_user_id": "<string>"
  },
  "action": "<string>",
  "resource": {
    "type": "<string>",
    "id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
    "label": "<string>"
  },
  "description": "<string>",
  "metadata": {},
  "ip_address": "<string>",
  "user_agent": "<string>",
  "session_id": "<string>",
  "request_id": "<string>",
  "severity": "info",
  "outcome": "success",
  "error_code": "<string>",
  "before_state": "<unknown>",
  "after_state": "<unknown>",
  "diff": "<unknown>",
  "_chain": {
    "prev_hash": "<string>",
    "entry_hash": "<string>",
    "archived_at": "2023-11-07T05:31:56Z"
  },
  "created_at": "2023-11-07T05:31:56Z"
}

Documentation Index

Fetch the complete documentation index at: https://docs.arcuserp.com/llms.txt

Use this file to discover all available pages before exploring further.

Authorizations

Authorization
string
header
required

API key issued per entity via Settings > Developers > API Keys. Each key carries scopes (e.g. orders:read, products:write). Bearer token format: Authorization: Bearer ark_live_ent_ Test keys use ark_test_ent_. Both are issued per entity via Settings > Developers > API Keys.

Path Parameters

id
string<uuid>
required

Query Parameters

expand
enum<string>[]

actor: resolve actor name/email from users table. resource: join full resource row (product, order, account, etc.). diff: include before_state, after_state, diff JSONB. chain: include prev_hash, entry_hash, archived_at.

Available options:
actor,
resource,
diff,
chain

Response

Single audit log entry

A single audit log entry from activity_log. Audit log entries are created automatically by canonical handlers via logActivity() and are immutable. The public API exposes read-only access only (Rule 20, append-only design). Chain integrity fields (prev_hash, entry_hash) are included when expand[]=chain is requested.

id
string<uuid>
object
enum<string>
Available options:
audit_log_entry
entity_id
string<uuid>
actor
object

Actor who performed the action. Resolved from metadata.actor JSONB.

action
string

Dot-namespaced action slug, e.g. order.created.

resource
object
description
string | null
metadata
object

Arbitrary JSONB payload. Internal keys (_actor, _api_key_id, etc.) prefixed with underscore.

ip_address
string | null
user_agent
string | null
session_id
string | null
request_id
string | null
severity
enum<string> | null
Available options:
info,
warning,
critical,
security
outcome
enum<string> | null
Available options:
success,
failure
error_code
string | null
before_state
any | null

State before the action. Present when expand[]=diff.

after_state
any | null

State after the action. Present when expand[]=diff.

diff
any | null

Computed diff of before/after state. Present when expand[]=diff.

_chain
object

Cryptographic chain fields. Present when expand[]=chain.

created_at
string<date-time>